Search CSNewbs
282 results found with an empty search
- Greenfoot Guide #1 | World Setup | CSNewbs
Learn how to start a new Greenfoot program and set up the world and actors ready for the next steps in creating a game. Part 1 of the Greenfoot Tutorial for the Eduqas/WJEC GCSE 2016 specification. 1. Setup & Populating the World Greenfoot Tutorial 1. Open Greenfoot This tutorial uses Version 2.4.2 which is the version students are given to use in the WJEC/Eduqas Component 2 exam . Click here for more information and how to download 2.4.2 . If you are using a more recent version the code should still work but the look of the program in the screenshots may be different. In the Component 2 exam of the 2016 WJEC/Eduqas specification you would skip ahead to the New Object Placements stage further down this page as the classes should be set up for you. Watch on YouTube: 2. New Scenario For a new project, click ' Scenario ' and then ' New '. If you are using a more recent version of Greenfoot select ' New Java Scenario '. Save this new project in a suitable location such as a folder named 'Greenfoot' . You may wish to save this project as ' SimpleGame ' or ' ExampleGame '. 3. Setup the MyWorld class The first thing to do is to create a subclass of World called MyWorld which becomes our background object. Right-click on the World class and select 'New subclass... ' Set the New class name to MyWorld . Choose any image from the 'backgrounds ' image category. I have chosen the 'cell.jpg ' image. Click the Compile button in the bottom right of the Greenfoot window to save the program . 4. Create the Main Character class Now to create a new class for the main character. Right-click on the Actor class and select 'New subclass... ' Give the new object an appropriate name and choose a relevant image . I have named my class 'Sheep ' and selected the sheep.png image. 5. Right-click on Actor and create two more classes: Collectable objects to pick up (e.g. my orange) An enemy character to avoid (e.g. my elephant) Don't forget to compile the program. Watch on YouTube: After creating your classes you must move them over to the game world. This is known as populating the world . 1. New Object Placements Right-click on your main character object and select the top option e.g. 'new Sheep()'. Drag your mouse to the world and click to drop it. Complete the following actions: Place 1 main character object. Place 5 collectible objects. Place 2 enemy objects. 2. Save the World Once you have populated your world with objects then right-click anywhere on the background and select 'Save the World '. This saves the positions of each object so that it won't reset every time you start a new game. You can close the MyWorld code that automatically opens when you save the world, we never add any code to this window. Part 2 - Movement (Arrow Keys) >
- The CPU | Key Stage 3 | CSNewbs
Learn about the Central Processing Unit (CPU) and factors such as clock speed. Learn about components within the CPU including the ALU and control unit. The CPU What is the CPU? The CPU CPU stands for C entral P rocessing U nit . The CPU is considered the brain of the computer because it is used to process data and instructions , just like a human brain . Every single type of computer needs a CPU , from desktop computers to laptops , game consoles , even smart TVs and smart watches . The CPU plugs directly into the motherboard in a special socket . What does the CPU do? The CPU works in a cycle (called the FDE cycle ), which it repeats up to billions of times a second . In the FDE cycle , the CPU first f etches instructions from RAM. Next, the CPU d ecodes (understands ) the instructions and finally e xecutes (runs ) them. RAM (Random Access Memory) Instructions CPU (Central Processing Unit) What is clock speed? The clock speed is how many instructions a CPU can carry out per second . Clock speed is measured in gigahertz (GHz ), where 1 GHz = 1 billion cycles per second . The higher the clock speed , the faster the CPU will run , as more instructions can be processed per second . What are the four components of the CPU? The Control Unit (CU ) sends control signals to direct the operation of the CPU . It also decodes instructions as part of the FDE cycle . ALU stands for Arithmetic Logic Unit . It performs simple calculations and compares data . The registers are temporary storage spaces for instructions inside the CPU. They are used in the FDE cycle . Cache memory stores frequently accessed data that the CPU needs to access at very high speeds . What is overclocking and underclocking? Typical clock speed: 3.5 GHz 3.9 GHz 3.3 GHz Overclocking is when the computer's clock speed is increased higher than the recommended speed. This will make the computer perform faster but it can lead to overheating and could damage the computer . Underclocking is when the computer's clock speed is decreased lower than the recommended speed. This will make the computer perform slower but will increase the lifespan of the computer . KS3 Home
- 4.4 - Arithmetic Shift - Eduqas GCSE (2020 Spec) | CSNewbs
Learn how binary numbers can be multiplied or divided using arithmetic shift. Understand the effect the shift has on the binary value. Based on the 2020 Eduqas (WJEC) GCSE specification. 4.4: Arithmetic Shift Exam Board: Eduqas / WJEC Specification: 2020 + What is arithmetic shift? Arithmetic shift is used to multiply and divide binary numbers . The effect of shifting left is to multiply a binary number. The effect is doubled by each place that is shifted . x The effect of shifting right is to divide a binary number. ÷ Shifting by 1 has an effect of 2 . Shifting by 2 has an effect of 4 . Shifting by 3 has an effect of 8 . For example, shifting left by 2 places has an effect of multiplying by 4 . Another example: Shifting right by 3 places has an effect of diving by 8 . How to shift a binary number: An exam question may ask you to arithmetically shift a binary number of up to 16 digits . Q uesto's Q uestions 4.4 - Arithmetic Shift: 1a. Draw a diagram to show the effect of multiplying and dividing a binary number . [2 ] 1b. Draw a diagram or table to show the effect a shift has for each place from 1 to 4 . For example, a shift of 1 place has an effect of 2. [4 ] 2. State the effect of the following shifts: a. Shift right by 2 places. b. Shift left by 1 place. c. Shift left 3 places. d. Shift right by 4 places. [ 1 each ] 3. Shift the following binary numbers and state the effect of the shift: a. 10101011 : Shift left by 2 places. b. 11101100 : Shift right by 3 place. c. 00001011 : Shift right by 2 places. d. 01101110 : Shift left by 1 place. [ 2 each ] Watch on YouTube 4.3 Binary Calculations Theory Topics 4.5 - Character Sets & Data Types
- OCR CTech IT | Unit 1 | 1.6 - Hardware Troubleshooting | CSNewbs
Learn about troubleshooting tests and information to record when a hardware error occurs. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 1.6 - Hardware Troubleshooting Exam Board: OCR Specification: 2016 - Unit 1 What is troubleshooting? Troubleshooting means to analyse and solve a problem with a computer system. Hardware troubleshooting refers to fixing an issue with the physical parts of the computer or any connected devices. Hardware issues might occur as a result of damage (intentional or accidental), power surges or malware . Steps to Take When an Error Occurs Try to identify the problem by looking for the simplest explanation first (e.g. checking the power supply) and ask the user questions about the issue. Create a theory about what the cause of the problem could be and prepare to test the theory using a series of troubleshooting tests . Create a troubleshooting plan and record the steps that are taken before moving on to the next test. Check the system works after each stage of the plan. Create a findings document that explains if and how the problem was fixed, for future reference if the problem occurs again. Documentation Technicians and help desk (see 3.5 ) staff should document , on a fault sheet , the following information regarding the issue: The fault itself (such as 'system not turning on'). The system in question. The user logged in at the time. Exact date & time the problem occurred. Symptoms of the issue (such as 'slow load times' or 'beeping'). Problem history - checking if it has happened to this system before. Back up documentation - Whether the data been backed up recently. Troubleshooting Tools The following tools can be used to identify an error so a technician has a greater understanding of the problem. Event Viewer Event Viewer is a type of utility software that lists detailed information about an error when one occurs. It can be used to work out how to fix the issue and will display both minor and major faults. Power On Self Test (POST) On start-up, a power on self test (POST) checks memory, power, hardware and cooling systems are all working properly. Beep codes signal if an error has been detected; 1 beep will sound for no error but if multiple beeps are heard then an error has been discovered. Ping Test This is a connectivity test between two computers. A message is sent to the destination computer and waits for a return message named the echo reply . This procedure can be repeated with other systems until the source of the problem is identified from a computer that does not reply . Q uesto's Q uestions 1.6 - Hardware Troubleshooting: 1. Summarise the 'Steps to Take when an Error Occurs ' section into your own top three tips for what to do when a hardware error happens . [3 ] 2. List 6 pieces of information that an IT technician should record when a hardware error has occurred . [6 ] 3. Briefly explain the purpose of three troubleshooting tools . [6 ] 1.5 - Communication Hardware 1.7 - Units of Measurement Topic List
- 2.1 - Primary Storage - OCR GCSE (J277 Spec) | CSNewbs
Learn what an embedded system is and about different examples of embedded systems. Based on the J277 OCR GCSE Computer Science specification (first taught from 2020 onwards). 2.1: Primary Storage (Memory) Exam Board: OCR Specification: J277 Watch on YouTube : Primary Storage RAM and ROM Virtual Memory Primary vs Secondary Storage Storage in a computer system is split into two categories: Primary Storage: Very quick because it is directly accesse d by the CPU . Typically smaller in storage size . Sometimes called ‘main memory’ . Includes RAM and ROM . Volatile vs Non-Volatile Storage Storage is also split into two types - volatile and non-volatile . Volatile storage is temporary - data is lost whenever the power is turned off . Example: RAM Non-volatile storage saves the data even when not being powered . Data can be stored long-term and accessed when the computer is switched on . Example: ROM Why do Computers need Primary Storage? Primary storage is low-capacity , internal storage that can be directly accessed by the CPU . Program instructions and data must be copied from the hard drive into RAM to be processed by the CPU because primary storage access speeds are much faster than secondary storage devices like the hard drive. Types of Primary Storage (Memory) Random Access Memory (RAM) Read-Only Memory (ROM) RAM is volatile (temporary) storage that stores all programs that are currently running . RAM also stores parts of the operating system to be accessed by the CPU. RAM is made up of a large number of storage locations, each can be identified by a unique address . ROM is non-volatile storage that cannot be changed . ROM stores the boot program / BIOS for when the computer is switched on. The BIOS then loads up the operating system to take over managing the computer. RAM ( R andom A ccess M emory) ROM ( R ead O nly M emory) Virtual Memory Programs must be stored in RAM to be processed by the CPU . Even if there is insufficient space in RAM for all programs the computer can use the hard disk drive (HDD ) as an extension of RAM - this is called virtual memory . If new data is needed to be stored in RAM then unused data in RAM is moved to the hard drive so the new data can be transferred into RAM . If the original data is required again, it can be moved back from virtual memory into RAM . Using virtual memory is beneficial because it allows more programs to be run at the same time with less system slow down . Secondary Storage: ( Section 2.2 ) Slower because it is not directly accessed by the CPU . Typically larger in storage size . Used for the long-term storage of data and files because it is non-volatile . Includes magnetic , optical and solid state storage. Q uesto's Q uestions 2.1 - Primary Storage (Memory): 1. Describe the differences between primary and secondary storage . [ 6 ] 2. Explain the difference between volatile and non-volatile storage . State an example of both types. [ 4 ] 3. Explain why the computer requires primary storage . [ 2 ] 4. For each type of memory below, describe it and state what information is stored within it: a . Random Access Memory (RAM) [3 ] b. Read-Only Memory (ROM) [ 3 ] c. Virtual memory [ 3 ] 1.3 - Embedded Systems Theory Topics 2.2 - Secondary Storage
- 1.3.1 - Application Types | F160 | Cambridge Advanced National in Computing | AAQ
Learn about the purpose and characteristics of the eight application types, including examples. Application types include communication, educational, entertainment, games, lifestyle, productivity, protection & utility and web browsers. Resources based on Unit F160 (Fundamentals of Application Development) for the OCR Cambridge Advanced National in Computing (H029 / H129) AAQ (Alternative Academic Qualification). Qualification: Cambridge Advanced National in Computing (AAQ) Unit: F160: Fundamentals of Application Development Certificate: Computing: Application Development (H029 / H129) 1.3.1 - Application Types Watch on YouTube : Application Types There are several types of applications that can be developed , each with a different purpose and common characteristics . There are eight application types you need to know for this 'Fundamentals of Application Development ' unit, including their purpose and common characteristics . Communication Purpose: Communication applications allow users to exchange information with others , most often in real-time . Data can be transferred in a range of formats including text , images and video . Education Purpose: To teach users about specific topics and help people learn new skills . This may be aimed at certain ages or user groups such as those learning a new language . Characteristics of Communication Applications: Has a simple user interface designed for quick and reliable data exchange . Supports multiple formats (text , images , audio , video and files ). Requires a network connection to send and receive data . Often has built-in security and privacy , such as end-to-end encryption . May use presence awareness such as showing ‘typing… ’ or ‘online now ’. Characteristics of Education Applications: It may be structured around learning milestones or long-term goals . Often interactive , such as quick quizzes or regular recaps of topics. Could include different formats of learning (such as text , visuals or audio ). Usually tracks skills or scores over time to show progress in a user-friendly way . Age-appropriate in content and design , possibly with difficulty levels . Examples: WhatsApp, Messenger, Zoom, Slack, Gmail Examples: Duolingo, Kahoot!, Quizlet, Memrise, Anki Entertainment Purpose: To provide enjoyment through formats such as video or audio , often with automatic suggestions based on previous interactions including watched videos , likes or comments . Characteristics of Entertainment Applications: Simple design to focus on keeping users engaged . May include streamed media content or the option to download . Designed for passive or relaxed use , e.g. watching or listening without interacting . Uses algorithms for recommendations based on user preferences . May include social features such as comments or sharing with friends . Examples: Netflix, Disney+, Spotify, YouTube, Twitch Games Purpose: To offer interactive challenges in a fun and possibly competitive way. Games may be played together online or offline for a single-player experience . Characteristics of Game Applications: Based on clear rules and objectives with reward systems , e.g. achievements . High interactivity and quick responsiveness to keep players engaged . Requires graphical rendering , user inputs and sound design . May support local multiplayer or online play with competition , like leaderboards . Often has a range of difficulty levels to keep players challenged . Examples: Minecraft, Fortnite, Among Us, EA Sports FC, Candy Crush Lifestyle Purpose: Supports a healthy and organised way of living . They often help people to manage their daily tasks and form positive personal routines . Productivity Purpose: To support users to complete tasks , manage their time or organise information in a helpful way , all to to maximise productivity . Characteristics of Lifestyle Applications: Often personalised to user preferences or personal data . May use real-time inputs such as location or health data , like steps taken . It may be integrated with smart wearable devices such as a smartwatch . Designed to be used briefly but daily (e.g. checking steps or logging meals ). Encourages improved habits or healthier improvements . Characteristics of Productivity Applications: Has a focus on efficiency , reliability and easy usability . Often allows collaboration and file sharing (e.g. working with colleagues ). Prioritises data organisation and quick access to relevant information . Usually integrated with cloud services or other apps like calendars . It may be designed for professional , personal or educational use . Examples: MyFitness Pal, Noom, Headspace, FitBit, Couch to 5k Examples: Microsoft Word, Calendar, Google Drive, Notion, Trello Protection & Utility Purpose: To secure the computer system against malicious threats and perform housekeeping tasks that maintain stability and a smooth performance . Characteristics of Protection & Utility Applications: Works in the background without frequent user interaction . Often requires permissions to access sensitive data . Needs to be updated frequently , e.g. adding new virus signatures to the database of an antivirus . May be event-driven (e.g. alerts or automatic scans at regular intervals ). Should use low system resources if it needs to be running constantly . Web Browsers Purpose: Accesses , retrieves and displays web pages from web servers . It provides tools like bookmarks , tabs and history to help users easily navigate the interne t. Characteristics of Web Browser Applications: Displays webpages that are built using HTML , CSS and JavaScript . Supports security protocols such as HTTPS , which uses encryption . Enables customisation and user control , e.g. bookmarks , extensions and themes . Contains an address bar to directly type in URLs or search terms . Allows for multiple tabs to run concurrently . Types of Application Examples: Avast Antivirus, CCleaner, 1Password, Battery Saver, Microsoft Defender Examples: Google Chrome, Safari, Mozilla Firefox, Microsoft Edge, Opera Q uesto's Q uestions 1.3.1 - Application Types: 1. Choose four application types and explain how each can be used in a school . [8 ] 2a. For two application types you did not mention in Q1 , explain their characteristics . [6 ] 2a. For the remaining two application types you have not mentioned , explain their purpose . [ 4 ] Minecraft is the best-selling video game of all time , with over 350 million copies sold since its official release in 2011 . D id Y ou K now? 1.2 - Operating Systems Topic List 1.3.2 - Application Software Categories
- 5.1.1 - Human Computer Interaction | F160 | Cambridge Advanced National in Computing AAQ
Learn about different types of human computer interaction (HCI) such as audio, movement / gesture, touch and visual (command line and graphical user interface (GUI)). Based on Unit F160 (Fundamentals of Application Development) for the OCR Cambridge Advanced National in Computing (H029 / H129) (AAQ - Alternative Academic Qualification). Qualification: Cambridge Advanced National in Computing (AAQ) Unit: F160: Fundamentals of Application Development Certificate: Computing: Application Development (H029 / H129) 5.1.1 - Types of Human-Computer Interaction Watch on YouTube : Human-Computer Interaction Human-computer interaction (HCI) refers to the ways in which users engage with computers and is an important factor that must be considered when designing and developing an application . For each type of HCI you need to know its purpose , devices on which it is used , its advantages and disadvantages and how client requirements may affect its use . Human-Computer Interaction Types of User Interaction Audio allows users to interact with a system using voice commands . Body movements or gestures (e.g. hand waves or head turns ) can control or interact with applications . Touch allows users to interact by tapping , swiping , dragging or pinching directly on a screen . Graphical user interfaces ( GUIs ) provide a visual interface using windows , icons , buttons and menus . Command-line interfaces ( CLIs ) only allow interaction with the system by typing text commands into a terminal or shell . Q uesto's Q uestions 5.1.1 - Types of Human-Computer Interaction: 1. A company selling toys wants to create an app to advertise its latest products . Justify the suitability of each user interaction type for the company's app . [5 ] 2. Compare the GUI and CLI visual interaction methods, including their advantages and disadvantages . [8 ] 3. Explain when the audio interaction method would be appropriate . [ 3 ] In 2012 Milwaukee County Zoo started giving iPads to orangutans so they could use the touchscreen to draw pictures . D id Y ou K now? 4.3 - Decomposition Methods Topic List 5.1.2 - Types of Device
- 2.5 - Compression - OCR GCSE (J277 Spec) | CSNewbs
Learn about the benefits of compression and the differences between lossy and lossless compression. Also, learn how compression ratios work. Based on the J277 OCR GCSE Computer Science specification (first taught from 2020 onwards). 2.5: Compression Exam Board: OCR Specification: J277 Watch on YouTube : Compression Benefits Lossy Compression Lossless Compression What is compression? To compress a file means to make its size smaller . Benefits of compression include: Files take up less storage space (so more files can be stored). Files can be transferred quicker (because they are smaller). Files can be read from or written to quicker . There are two methods that are used to compress files: Lossy and Lossless . Lossy Compression Lossy compression uses an algorithm (set of instructions) to analyse a file and remove data that cannot be heard or seen by humans . For example, a lossy algorithm would analyse the sound waves of an audio file and remove any frequencies which humans cannot hear. This process reduces the size of the file . Further lossy compression will remove data that humans can see / hear . For example, the dog image to the right has been strongly compressed using a lossy algorithm and some data has clearly been removed. Lossy compression removes the data permanently , so the file can never return to its original form . Lossy compression is often used with images , audio and video to reduce the file size, for example to send over the internet. Lossless Compression Lossless compression reduces the size of a file without permanently removing any data . Because of this, the file is returned to its original form when decompressed, so no quality is lost . A file that is compressed with a lossless algorithm is usually larger than a file compressed with a lossy algorithm because no data has been permanently removed. Lossless compression is used with files that would not function properly if data were permanently removed, such as executable files (e.g., programs and games) or word documents . Remember that lossy and lossless compression do not just refer to images. Below is an audio file that has been compressed with lossy compression . Data has been removed so the audio quality has decreased. 197 KB 81 KB 43 KB Q uesto's Q uestions 2.5 - Compression: 1. Describe 3 benefits of compressing a file . [ 3 ] 2. Describe the differences between lossy and lossless compression . [4 ] 3. A student needs to compress a Microsoft Word document to send in an email. Suggest which type of compression they should use and why . [ 2 ] 2.4e Sound Storage Theory Topics 3.1a - Network Types & Performance
- Greenfoot | CSNewbs
The Greenfoot homepage on CSNewbs with links to creating your own Greenfoot game from scratch, as well as key code and how to solve common errors. This section is aimed at the Eduqas GCSE 2016 specification. Links: Installing Greenfoot Greenfoot Game Tutorial Glossary of Key Code Help with Errors I'm Greta the Gecko and I'm here to teach you Greenfoot.
- Unit 1 - Fundamentals of IT - Cambridge Technicals | CSNewbs
Navigate between all Unit 1 (Fundamentals of IT) topics in the OCR Cambridge Technicals Level 3 IT 2016 specification. OCR Cambridge Technicals IT Level 3 Unit 1: Fundamentals of IT These pages are based on content from the OCR Cambridge Technicals 2016 Level 3 IT specification . This website is in no way affiliated with OCR . This qualification stopped in July 2025. The pages on the site will remain for at least two years. LO1 (Computer Hardware ) 1.1 - Computer Hardware 1.2 - Computer Components 1.3 - Types of Computer System 1.4 - Connectivity 1.5 - Communication Hardware 1.6 - Hardware Troubleshooting 1.7 - Units of Measurement 1.8 & 1.9 - Number Systems & Conversion LO2 (Computer Software ) 2.1 - Types of Software 2.2 - Applications Software 2.3 - Utility Software 2.4 - Operating Systems 2.5 - Communication Methods 2.6 - Software Troubleshooting 2.7 - Protocols LO3 (Networks & Systems ) 3.1 - Server Types 3.2 - Virtualisation 3.3 - Network Characteristics 3.4 - Connection Methods 3.5 - Business Systems LO4 ( Employability & Communication ) 4.1 - Communication Skills 4.2 - Communication Technology 4.3 - Personal Attributes 4.4 - Ready for Work 4.5 - Job Roles 4.6 & 4.7 - Bodies & Certification LO5 (Issues & Security ) 5.1 - Ethical Issues 5.2 - Operational Issues 5.3 - Threats 5.4 - Physical Security 5.5 - Digital Security 5.6 - Data & System Disposal
- CTech 4.4 - Ready For Work | CSNewbs
Learn about three key methods of ensuring that an employee is ready for a successful job role, such as their clothing, hygiene and attitude. Based on the 2016 OCR Cambridge Technicals Level 3 IT specification. 4.4 - Ready for Work Exam Board: OCR Specification: 2016 - Unit 1 Successful employees always demonstrate that they are ready to work hard for their organisation by presenting themselves in a professional manner in line with the company's policies. Dress Code Employees must follow the dress code policy of an organisation at all times . For some businesses this may be very formal such as a suit and tie for men and a smart dress or trousers for women. Other organisations enforce a smart-casual dress code where expectations for dress are not as strict but obscene attire is still not permitted. Different job roles within a company may also have different expected standards of dress , for example a manager may require a tie and a technician may not. Presentation Employees should have good personal hygiene so that they can comfortably communicate with other staff members and customers. Good personal hygiene demonstrates respect for the organisation, other employees and yourself. Wearing clean clothes and avoiding bad odour help to give a professional impression . Attitude Maintaining a positive attitude can help you to be noticed and liked by peers and management. Having an 'I can do it' attitude, even during difficult times, will make you a hugely important team member of an organisation. Employees should be able to adapt and respond to on-going situations, be flexible and listen to suggestions made by others. Q uesto's Q uestions 4.4 - Ready for Work: 1. What is meant by a dress code ? Explain why it is important for employees of an organisation to follow the company's dress code policy . [2 ] 2. Why is personal presentation so important in an organisation? [2 ] 3. A games company has had its latest game flop and nobody seems to be buying it. What should the attitude of the company manager be during this time? [3 ] 4. Explain why two workers in the same company may have different expected standards of dress . [1 ] 5. Identify and describe three ways that IT employees can demonstrate that they are ready for work . You should refer to each of the 3 subsections (dress code, presentation and attitude). [6 ] 4.3 - Personal Attributes Topic List 4.5 - Job Roles
- 4.3 - Binary Calculations - Eduqas GCSE (2020 Spec) | CSNewbs
Learn about how to perform binary addition and binary subtraction. Based on the 2020 Eduqas (WJEC) GCSE specification. 4.3: Binary Calculations Exam Board: Eduqas / WJEC Specification: 2020 + What are binary calculations? Binary addition and binary subtraction are methods of adding or subtracting binary values without having to convert them into denary. How to add binary numbers: How to subtract binary numbers: Overflow & Underflow Errors Overflow and underflow errors occur when there is not enough space to accurately represent a binary number in the bits available . What is an overflow error? An overflow error occurs when a binary value is too large to be stored in the bits available . In technical terms, an overflow error occurs if a carry (remainder) is present on the most significant bit (MSB ). The CPU then sets the overflow flag to true . The most significant bit (MSB ) is the largest bit (always the one furthest to the left ) of a binary value (e.g. 128 for an 8 bit value). A flag is an alert signal . It is either on or off. The overflow flag is turned on by the CPU when an overflow occurs. What is an underflow error? An underflow error occurs when a number is too small to be stored in the bits available . The value is too close to 0 to be accurately represented in binary. Q uesto's Q uestions 4.3 - Binary Calculations: 1a. Describe the terms ' most significant bit ' and ' flag '. [ 2 ] 1b. Using the terms from 1a , explain what an overflow error is. [ 2 ] 1c. Describe what is meant by an underflow error . [ 2 ] 2. Add together the following binary values. If an overflow error occurs you must state one has occurred. a. 010110012 and 010001012 [2 ] b. 110110112 and 010111012 [2 ] c. 001101102 and 011010112 [2 ] d. 110110112 and 010101112 [2 ] e. 011011012 and 110101102 [2 ] 3. Subtract the following binary values; put the first value on top of the second value: a. 100110102 and 000110002 [2 ] b. 110110112 and 010111012 [2 ] c. 011101102 and 011010112 [2 ] d. 110110112 and 010101112 [2 ] e. 111011012 and 110101102 [2 ] Watch on YouTube Watch on YouTube 4.2 Signed Binary Theory Topics 4.4 - Arithmetic Shift








